Matrix Multiplication Verification Using Coding Theory

Authors Huck Bennett , Karthik Gajulapalli , Alexander Golovnev , Evelyn Warton



PDF
Thumbnail PDF

File

LIPIcs.APPROX-RANDOM.2024.42.pdf
  • Filesize: 0.76 MB
  • 13 pages

Document Identifiers

Author Details

Huck Bennett
  • University of Colorado Boulder, CO, USA
Karthik Gajulapalli
  • Georgetown University, Washington DC, USA
Alexander Golovnev
  • Georgetown University, Washington DC, USA
Evelyn Warton
  • Oregon State University, Corvallis, OR, USA

Acknowledgements

We thank Amir Nayyeri for many helpful discussions in the early stages of work on this paper, and Mark Iwen [Mark A. Iwen, 2023] for answering questions about [Mark A. Iwen and Craig V. Spencer, 2009]. We also thank the anonymous reviewers for their helpful comments.

Cite AsGet BibTex

Huck Bennett, Karthik Gajulapalli, Alexander Golovnev, and Evelyn Warton. Matrix Multiplication Verification Using Coding Theory. In Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques (APPROX/RANDOM 2024). Leibniz International Proceedings in Informatics (LIPIcs), Volume 317, pp. 42:1-42:13, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2024)
https://doi.org/10.4230/LIPIcs.APPROX/RANDOM.2024.42

Abstract

We study the Matrix Multiplication Verification Problem (MMV) where the goal is, given three n × n matrices A, B, and C as input, to decide whether AB = C. A classic randomized algorithm by Freivalds (MFCS, 1979) solves MMV in Õ(n²) time, and a longstanding challenge is to (partially) derandomize it while still running in faster than matrix multiplication time (i.e., in o(n^ω) time). To that end, we give two algorithms for MMV in the case where AB - C is sparse. Specifically, when AB - C has at most O(n^δ) non-zero entries for a constant 0 ≤ δ < 2, we give (1) a deterministic O(n^(ω-ε))-time algorithm for constant ε = ε(δ) > 0, and (2) a randomized Õ(n²)-time algorithm using δ/2 ⋅ log₂ n + O(1) random bits. The former algorithm is faster than the deterministic algorithm of Künnemann (ESA, 2018) when δ ≥ 1.056, and the latter algorithm uses fewer random bits than the algorithm of Kimbrel and Sinha (IPL, 1993), which runs in the same time and uses log₂ n + O(1) random bits (in turn fewer than Freivalds’s algorithm). Our algorithms are simple and use techniques from coding theory. Let H be a parity-check matrix of a Maximum Distance Separable (MDS) code, and let G = (I | G') be a generator matrix of a (possibly different) MDS code in systematic form. Our deterministic algorithm uses fast rectangular matrix multiplication to check whether HAB = HC and H(AB)^T = H(C^T), and our randomized algorithm samples a uniformly random row g' from G' and checks whether g'AB = g'C and g'(AB)^T = g'C^T. We additionally study the complexity of MMV. We first show that all algorithms in a natural class of deterministic linear algebraic algorithms for MMV (including ours) require Ω(n^ω) time. We also show a barrier to proving a super-quadratic running time lower bound for matrix multiplication (and hence MMV) under the Strong Exponential Time Hypothesis (SETH). Finally, we study relationships between natural variants and special cases of MMV (with respect to deterministic Õ(n²)-time reductions).

Subject Classification

ACM Subject Classification
  • Theory of computation → Design and analysis of algorithms
  • Theory of computation → Pseudorandomness and derandomization
  • Theory of computation → Error-correcting codes
Keywords
  • Matrix Multiplication Verification
  • Derandomization
  • Sparse Matrices
  • Error-Correcting Codes
  • Hardness Barriers
  • Reductions

Metrics

  • Access Statistics
  • Total Accesses (updated on a weekly basis)
    0
    PDF Downloads

References

  1. Amir Abboud, Karl Bringmann, Nick Fischer, and Marvin Künnemann. The time complexity of fully sparse matrix multiplication. In SODA, 2024. Google Scholar
  2. Divesh Aggarwal, Huck Bennett, Zvika Brakerski, Alexander Golovnev, Rajendra Kumar, Zeyong Li, Spencer Peters, Noah Stephens-Davidowitz, and Vinod Vaikuntanathan. Lattice problems beyond polynomial time. In STOC, 2023. Google Scholar
  3. Joah Alman and Virginia Vassilevska Williams. A refined laser method and faster matrix multiplication. In SODA, 2021. Google Scholar
  4. Noga Alon, Oded Goldreich, Johan Håstad, and René Peralta. Simple construction of almost k-wise independent random variables. In FOCS, 1990. Google Scholar
  5. Tatiana Belova, Alexander Golovnev, Alexander S. Kulikov, Ivan Mihajlin, and Denil Sharipov. Polynomial formulations as a barrier for reduction-based hardness proofs. In SODA, 2023. Google Scholar
  6. Tatiana Belova, Alexander S. Kulikov, Ivan Mihajlin, Olga Ratseeva, Grigory Reznikov, and Denil Sharipov. Computations with polynomial evaluation oracle: ruling out superlinear SETH-based lower bounds. arXiv, 2023. URL: https://arxiv.org/abs/2307.11444.
  7. Huck Bennett, Karthik Gajulapalli, Alexander Golovnev, and Evelyn S Warton. Matrix multiplication verification using coding theory. arXiv preprint, 2023. URL: https://arxiv.org/abs/2309.16176.
  8. Harry Buhrman and Robert Spalek. Quantum verification of matrix products. arXiv, 2004. URL: https://arxiv.org/abs/quant-ph/0409035.
  9. Marco L. Carmosino, Jiawei Gao, Russell Impagliazzo, Ivan Mihajlin, Ramamohan Paturi, and Stefan Schneider. Nondeterministic extensions of the strong exponential time hypothesis and consequences for non-reducibility. In ITCS, 2016. Google Scholar
  10. Henry Cohn, Robert Kleinberg, Balázs Szegedy, and Christopher Umans. Group-theoretic algorithms for matrix multiplication. In FOCS, 2005. Google Scholar
  11. Ran Duan, Hongxun Wu, and Renfei Zhou. Faster matrix multiplication via asymmetric hashing. In FOCS, 2023. Google Scholar
  12. Rūsiņš Freivalds. Fast probabilistic algorithms. In MFCS, 1979. Google Scholar
  13. Leszek Gasieniec, Christos Levcopoulos, Andrzej Lingas, Rasmus Pagh, and Takeshi Tokuyama. Efficiently correcting matrix products. Algorithmica, 79(2):428-443, 2017. Google Scholar
  14. Jonathan I. Hall. Notes on coding theory. Available at URL: https://users.math.msu.edu/users/halljo/classes/codenotes/GRS.pdf.
  15. Wing-Kai Hon, Meng-Tsung Tsai, and Hung-Lung Wang. Verifying the product of generalized boolean matrix multiplication and its applications to detect small subgraphs. In WADS, 2023. Google Scholar
  16. Mark A. Iwen, 2023. Personal Communication. Google Scholar
  17. Mark A. Iwen and Craig V. Spencer. A note on compressed sensing and the complexity of matrix multiplication. Information Processing Letters, 109(10):468-471, 2009. URL: https://doi.org/10.1016/j.ipl.2009.01.010.
  18. Hamid Jahanjou, Eric Miles, and Emanuele Viola. Local reductions. In ICALP, 2015. Google Scholar
  19. Tracy Kimbrel and Rakesh Kumar Sinha. A probabilistic algorithm for verifying matrix products using O(n²) time and log₂ n + O(1) random bits. Information Processing Letters, 45(2):107-110, 1993. Google Scholar
  20. Ivan Korec and Jiří Wiedermann. Deterministic verification of integer matrix multiplication in quadratic time. In SOFSEM, 2014. Google Scholar
  21. Marvin Künnemann. On nondeterministic derandomization of Freivalds' algorithm: Consequences, avenues and algorithmic progress. In ESA, 2018. Google Scholar
  22. François Le Gall. Faster rectangular matrix multiplication by combination loss analysis. In SODA, 2024. Google Scholar
  23. François Le Gall and Florent Urrutia. Improved rectangular matrix multiplication using powers of the Coppersmith-Winograd tensor. In SODA, 2018. Google Scholar
  24. Ron M. Roth and Abraham Lempel. On MDS codes via Cauchy matrices. IEEE Transactions on Information Theory, 35(6):1314-1319, 1989. Google Scholar
  25. Virginia Vassilevska Williams, Yinzhan Xu, Zixuan Xu, and Renfei Zhou. New bounds for matrix multiplication: from alpha to omega. In SODA, 2024. Google Scholar
  26. Yu-Lun Wu and Hung-Lung Wang. Correcting matrix products over the ring of integers. arxiv, 2023. URL: https://arxiv.org/abs/2307.12513.
  27. Uri Zwick. All pairs shortest paths using bridging sets and rectangular matrix multiplication. Journal of the ACM, 49(3):289-317, 2002. Google Scholar
Questions / Remarks / Feedback
X

Feedback for Dagstuhl Publishing


Thanks for your feedback!

Feedback submitted

Could not send message

Please try again later or send an E-mail